Sciweavers

625 search results - page 120 / 125
» Optimal resource allocation for security in reliability syst...
Sort
View
RTSS
2005
IEEE
14 years 29 days ago
Building Robust Wireless LAN for Industrial Control with DSSS-CDMA Cellphone Network Paradigm
Deploying Wireless LAN for Industrial Control (ICWLAN) has many benefits, such as mobility, low deployment cost and ease of reconfiguration. However, the top concern is robustne...
Qixin Wang, Xue Liu, Weiqun Chen, Wenbo He, Marco ...
ESA
2007
Springer
105views Algorithms» more  ESA 2007»
14 years 1 months ago
Non-clairvoyant Batch Sets Scheduling: Fairness Is Fair Enough
In real systems, such as operating systems, the scheduler is often unaware of the remaining work in each job or of the ability of the job to take advantage of more resources. In th...
Julien Robert, Nicolas Schabanel
ACMACE
2009
ACM
13 years 10 months ago
Enhancing a motion capture interface by introducing context management
Nowadays, video games propose rich scenarios with movementsbased game play, through the manipulation of dedicated devices. The motivation of this study is the elaboration of a com...
Francois Picard, Pascal Estraillier
TWC
2008
154views more  TWC 2008»
13 years 7 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
VEE
2009
ACM
146views Virtualization» more  VEE 2009»
14 years 2 months ago
Demystifying magic: high-level low-level programming
r of high-level languages lies in their abstraction over hardware and software complexity, leading to greater security, better reliability, and lower development costs. However, o...
Daniel Frampton, Stephen M. Blackburn, Perry Cheng...